IT1404 MOBILE COMPUTING. Part A

Size: px
Start display at page:

Download "IT1404 MOBILE COMPUTING. Part A"

Transcription

1 IT1404 MOBILE COMPUTING Part A 1.Define SAMA. Spread Aloha Multiple Access is a combination of CDMA and TDMA. The CDMA better suits for connection oriented services only and not for connection less bursty data traffic because it requires to program both sender and receiver to access different users with different codes. 2.Define CDMA. Code Division Multiple Access systems use codes with certain characteristics to separate different users. To enable access to the shared medium without interference. The users use the same frequency and time to transmit data. The main problem is to find good codes and to separate this signal from noise. The good code can be found the following 2 characteristic 1.Orthogonal. 2.AutoCorrelation. 3..What are the several versions in CSMA? There are several versions in CSMA, they are as follows a) non-persistent CSMA b) p-persistent CSMA c) 1-persistent CSMA 4.What is meant by non-persistent CSMA? In, non-persistent CSMA, stations sense the carrier and start sending immediately if the medium is idle., if the medium is busy, the station pauses a random amount of time before sensing the medium again and repeating this pattern. 5.What is meant by p-persistent CSMA? In p-persistent CSMA system nodes also sense the medium, but only transmit with a probability of p. With the station deferring to the next slot with the probability 1-p, i.e. access is slotted in addition. 6. What is SDMA? Space Division Multiple Access (SDMA) is used for allocating separated spaces to users in wireless networks. The basis for the SDMA algorithm is formed by cells and sectorized antennas which constitute the infrastructure implementing space division multiplexing (SDM) 7. What is FDD? In FDMA, the base station and the mobile station establish a duplex channel. The two directions, mobile station to base station and vice versa are separated using different frequencies. This Scheme is called Frequency Division Duplex (FDD) 8. What are the 2 sub layers in DLC? Logical Link Control(LLC) Media Access Control(MAC) 9) What is EY-NMPA? Elimination yield Non Pre-emptive Multiple Access (EY-NMPA) is a scheme which uses several phases to sense the medium. access the medium and for contention resolution.. Priority schemes can also be included.

2 This is actually used in HIPERLAN1 specification. 10) What do you mean by Polling? Polling is a strictly centralized scheme with one master and several slave stations. The master can collect the list of stations during the contention phase and can poll these slaves according to many schemes like round robin, random access, reservation scheme etc. 11) What are the four types of handover available in GSM? 1.Intra cell Handover 2.Inter cell Intra BSC Handover 3.Inter BSC Intra MSC handover 4.Inter MSC Handover 12) What is TETRA? TETRA (Terrestrial Trunked Radio) systems use different radio carrier frequencies, but they assign a specific carrier frequencies for a short period of time according to demand. TETRA s are highly reliable and extremely cheap. 13) what are the categories of Mobile services? Bearer services Tele services Supplementary services 14)What are the services provided by supplementary services? User identification Call redirection Call forwarding Closed user groups Multiparty Communication 15) What are types of Handover? Intra-cell handover Inter-cell,intra- BSC handover Inter-BSC, intra-msc handover Inter MSC handover 16.What is meant by GPRS? The General Packet Radio Service provides packet mode transfer for applications that exhibit traffic patterns such as frequent transmission of small volumes. 17)What are subsystems in GSM system? Radio subsystem(rss) Network & Switching subsystem(nss) Operation subsystem(oss) 18)What are the information in SIM? card type, serial no, list of subscribed services Personal Identity Number(PIN) Pin Unlocking Key(PUK) An Authentication Key(KI) 19)Define Normal Burst? The frame used for normal data transmission within a time slot is called Normal Burst. 20)What are the logical channels in GSM? Traffic channel(tch) Control channel(cch) 23) What is the function of Medium Access Control Layer?

3 The functions of Medium Access Control Layer is responsible for establishes, maintains, and releases channels for higher layers by activating and deactivating physical channels. 24) What is meant by GEO? GEO means Geostationary or Geosynchronous earth orbit. GEO satellites have a distance of almost km to the earth. Examples are almost all TV and radio broadcast satellites, many weather satellites and satellites operating as backbone for the telephone network. 25) what are the advantages of GEO? Three GEO satellites are enough for a complete coverage of almost any spot on earth, senders and receivers can use fixed antennas positions, no adjusting is needed. Therefore GEO s are ideal for T.V and radio broadcasting 26)What is Handover? The satellite is the base station in satellite communication systems and that it self is moving. So, additional instance of handover are necessary due to the movement of the satellite 1.Intra Satellite handover: 2.Inter Satellite handover. 3.Gateway handover. 4.Inter System handover. 27) What are the registers maintained by the gateway of satellite? 1.Home Location Register(HLR). 2.Visitor Location Register(VLR). 3.Satellite User Mapping Register(SUMR). 28)Advantages of MEO Using Orbits around 10,000Km, the system only requires a dozen satellites which is more than the GEO system, but much less than a LEO system. Further more these satellites move slower relative to the earth s rotation allowing a simpler system design. Depending on the inclination a MEO can cover larger populations, thus requiring less handovers. 29) Applications of Satellite? Satellites can be used in the Following Areas Weather Forecasting Radio and TV broadcast Satellites Military Satellites Satellites for Navigation 30) What are the applications in satellites? Weather forecasting satellites Radio & TV broadcast satellites Military satellites Satellites for navigation Mobile communication 31) What are the advantages of LEO? Data rate is 2400 bit/s Packet delay is relatively low Smaller footprints of LEO allows frequency reuse Provide high elevations

4 32) Define the inclination angle and perigee. The inclination angle is defined as the angle between the equatorial plane and the plane described by the satellite orbit. An inclination angle of 0 degrees means that the satellite is exactly above the equator. If the satellite does not have a circular orbit, the closest point to the earth is called the perigee. 33) Define the elevation angle and footprint. The elevation angle is defined as the angle between the centre of satellite beam and the plane tangential to the earth s surface. The foot-print can be defined as the area on earth where the signals of the satellite can be received. 34) Define Header core. Seven bytes field contains the sizes of the header and the body, the content type of the object. Depending on this header information, the receiver may decide if it has enough resources(memory, cpu, power, display etc) available to decode and further process the object. 35) What is MSC? Main Service Channel(MSC) carries all user data. eg. audio, multimedia data. 36) What is FIC? The Fast Information Channel(FIC) contains Fast Information Block(FIB) with 256bits each(16 bit checksum). An FIC carries all control information which is required for interpreting the configuration and content of the MSC. 37) What are the different types of disk? A flat disks Skewed disks Multi disks 38) What are the goals of DVB? The goal of DVB is to introduce digital TV broadcasting using satellite transmission (DVB-5) cable technology (DVB-c) and terrestrial transmission (DVB-7). 39) Name some of the formats supported by MOT?. Multimedia and Hypermedia information coding experts group(mheg) Join photograph s experts group(jpeg) American standard code for information interchange(ascii) Moving pictures expert group(mpeg) Hypertext markup language(html) Hypertext transfer protocol(http) Bitmap(BMP) Graphics interchange format(gif) 40) Give structure MOT object. 7bytes variable size variable size Header core Header Extension Body Header core : contain the size of the header and body and the content type of the object.

5 Header Extension : contains additional object handling data such as repetition distance to support caching, segmentation information and priority of the data. Body : contains arbitrary data to be transmitted. 41)What are different interleaving and repetition schemes applied by DAB to objects and segments? 1.Object Repetition. 2.Interleaved Objects. 3.Segment repetition. 4.Header repetition. 42) What are the advantages of DAB? 1.DAB can offer sound in CD like quality. 2.DAB can use single frequency network where all senders transmitting the same radio program can operate at the same frequency. 3.DAB use VHF and UHF frequency bands. 4.DAB uses DQPSK modulation scheme. 5.DAB user COFDM and FEC. 6.DAB can transmit up to six stereo audio programmes with a data rate of 192kbit/s each. 43) What is object repetition? DAB can repeat objects several times. If an object A consists of four segments(a1,a2,a3,a4) a single repetition pattern would be A1A2A3A4A1A2A3A4A1A2A3A4.. 44) What is EIT? Event Information Table(EIT) contains status information about the current transmission and some additional information for set-top boxes. 45) What are the service information sent by DVB? Digital Video Broadcast Containers are basically MPEG-2 frames. DVB sends service information. These information are, 1.Network information table(nit). 2.Service Description Table(SDT). 3.Event Information Table(EIT). 4.Time and Date Table(TDT) 46) What are the advantages of DVB? 1.Data rates planned for users are 6-38mbit/s for the downlink and kbit/s for the uplink. 2.Transmitted along with TV programmes and doesn t require additional lines or hardware per customer. 3.Can be used in remote areas and developing countries where there is no high band width wired network. 47) what is meant by beacon? A beacon contains a timestamp and other management information used for power management and roaming.

6 e.g., identification of the base station subsystem(bss) 48) What is Active scanning? Active scanning comprises sending a probe on each channel and waiting for response. Beacon and Probe response contain the information necessary to join the new BSS. 49) What is Passive Scanning? Passive Scanning Simply means listening into the medium to find other networks, i.e. receiving the beacon of another network issued by the synchronization function within an access point 50) what is the primary goal of IEE ? The primary goal of the standard was the specification of a simple, robust, WLAN which offers time bounded and asynchronous services also it should be able to operate with multiple physical layers. 51) what is meant by SIFS? SIFS means Short Inter Frame Spacing. The shortest waiting time defined for short control message such as acknowledgements or polling response. 52) What are Advantages of wireless LAN? Flexibility, Planning, Design, Robustness, Quality Service, Cost, Proprietary Solution, Restriction, Safety and Security 53) What are Design Goals of Wireless LAN? Global Operation Low Power License-free Operation Robust transmission technology Simplified spontaneous co-operation Easy to use protection of investment Safety and Security Transparency for application 54)What are the three Low Power States provided by Bluetooth? PARK state HOLD state SNIFF state 55)What is SCO? SCO-stands for Synchronous Connection Oriented Link Standard telephone (voice) connection require symmetrical, circuit-switched, point-topoint connections. For this type of link, the master reserves two consecutive slots at fixed intervals. 56)What are the three phases in EY-NPMA? i. Prioritization: Determine the highest priority of a data packet ready to be sent on competing nodes. ii. Contention: Eliminate all but one of the contenders, if more than one sender has

7 the highest current priority. iii. Transmission: Finally, transmit the packet of the remaining node. 57)What are Advantages and Disadvantages of Infrared? Advantages: i. Simple and extremely cheap senders and receivers which integrated in almost all mobile devices ii. No licenses are needed for infrared technology and shielding is very simple. iii. Electrical devices do not interfere with infrared transmission. Disadvantages: i. Low bandwidth ii. Quite easily shielded iii. Cannot Penetrate 58) What are the system integration functions of MAC management? Synchronization Power management Roaming Management information base (MIB) 59) What do you meant by roaming?. Moving between access point is called roaming. Even wireless networks may require more than one access point to cover all rooms. In order to provide uninterrupted service, we require roaming when the user moves from one access point to another. 60) What is mobile routing? Even if the location of a terminal is known to the system, it still has to route the traffic through the network to the access point currently responsible for the wireless terminal. Each time a user moves to a new access point, the system must reroute traffic. This is known as mobile routing. 61) What are the functions which support service and connection control? >Access point control function >Call control and connection control function >Network security agent >Service control function >Mobility management function 62) What are the examples for service scenarios identified in WATM? >Office environments >Universities, schools, training, centres >Industry >Hospitals >Home >Networked vehicles 63) What is BRAN? The broadband radio access networks(bran) which have been standardized by European Telecommunications Standard Institute(ETSI) are a possible choice for an RAL for WATM. Although BRAN has been standardized independently from WATM, there is co-operation between the two to concentrate the common efforts on one goal. The main motivation behind BRAN is the deregulation and privatization of the telecommunication sector in Europe. 64) What are the different network types of BRAN? >Hyperlan1

8 >Hyperlan2 >Hyper access >Hyperlink 65) What is the main problem for WATM during handover? The main problem for WATM during the handover is rerouting of all connections and maintaining connection quality. 66) What are the different segments in ATM end-to-end connection? An ATM end-to-end connection is separated into different segments. >A fixed segment is a part of the connection that is not affected by the handover >Handover segment is affected by the handover and is located completely within a handover domain. 67) What is anchor point?. The Anchor point is the boundary between a handover segment and a fixed segment. 68) What are different types of handover? >Hard handover >Terminal initiated >Network initiated >Network initiated, terminal assisted >Network controlled >Backward handover >Forward handover 69) What is mobile terminal and wireless terminal?. Mobile terminal is a standard ATM terminal with the additional capability of reconnecting after access point change. the terminal can be moved between different access point within a certain domain. Wireless terminal is accessed via a wireless link, but the terminal itself is fixed, i.e., the terminal keeps its access point to the network. 70) What is generic routing encapsulation? Generic routing encapsulation (GRE) is an encapsulation scheme which supports other network protocols in addition to IP. It allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite. 71) Define COA. The COA (care of address) defines the current location of the MN from an IP point of view. All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using the tunnel. 72) What is meant by Transparency? Mobility should remain invisible for many higher layer Protocols and applications. The only affects of mobility should be a higher delay and lower bandwidth which are natural in the case of mobile networks. 73) What is Generic Routing encapsulation? Generic Routing encapsulation (GRE) allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suit. 74)What is Binding Request? Any node that wants to know the current location of an MN can send a binding request to the HA. The HA can check if the MN has allowed dissemination of its current location. 75) What are the possibilities for the location of care-of-address (COA)? The two possibilities for the location of care-of-address are: i.foreign agent COA

9 ii.co-related COA 76) What are the requirements for the development of mobile IP standard? The requirements are: a.compatibility b.transparency c.scalability and efficiency d.security 77) What is COA? Care Of Address (COA) define the current location of the MN (Mobile Node) from an IP point of view. DHCP is a good candidate for supporting the acquisition of Care Of Addresses. 78) What is Dynamic source Routing? Dynamic Source Routing eliminates all periodic routing updates. If a node needs to discover a route, it broadcast a route request with a unique identifier and the destination address as parameters. Any node that receivers a route request gives a list of addresses representing a possible path on its way toward the destination. 79) Why is need of routing? Routing is to find the path between source and destination and to forward the packets appropriately. 80) Define Mobile node: Mobile node: A mobile node is an end-system or router that can change its point of attachment to the Internet using mobile IP. The MN keeps its IP address and can continuously with any other system in the Internet as long as link layer connectivity is given. 81) What is Encapsulation and Decapsulation? Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it into the data part of a new packet. The reverse operation, taking a packet out of the data part of another packet,is called decapsulation. 82) what are the two functions of the transport layer in the internet? The two functions of the transport layer in the internet are check summing over user data and multiplexing/ demultiplexing of data from applications. 83) what is called the exponential growth of the congestion window? The sendor always calculate congestion window for a window start size of the congestion window is one segment. Sender sends one packet and waits for acknowledgement. If acknowledgement arise it raises the level of congestion window by one. If sender sends two packet if acknowledgement arrises it raises the level of congestion window by two. This scheme raises the level of congestion window every time the acknowledges come back, which takes roundtrip time(rtt).this is called the exponential growth of the congestion window? 84) Advantages of I-TCP: I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed network or other hosts in a wireless network that do not use this optimization. Without partitioning retransmission of lost packets would take place between mobile host and correspondent host across the whole network. Optimization of new mechanisms is quite simple to be done in I-TCP as

10 they only cover a single hop. The short delay between the mobile host and foreign agent can be determined and is independent of other traffic streams. Therefore an optimized TCP can use precise time-outs to guarantee retransmission as fast as possible. Partitioning into two connections also allows the use of a different transport layer protocol between the foreign agent and the mobile host or the use of compressed headers etc. The foreign agent can act as a gateway to translate between different protocols..85) Disadvantages of I-TCP: The loss of the end to end semantics of TCP cause problems if the foreign agent portioning the TCP connection crashes. An increased handover latency is more problematic in practical use The foreign agent must be a trusted entity because the TCP connections end at this point. 86) Define Slow Start? TCP s reaction to a missing acknowledgement is quite drastic, but necessary to get rid of congestion. The behaviour TCP shows after the detection of congestion is called Slow start. 87) How does data transmission takes place? Data transmission takes place using network adapters, fibre optics, copper wires, special hardware for routers etc. 88) What is mean by Slow Start? TCP s reaction to a missing acknowledgement is quite drastic, but necessary to get rid of congestion fast enough. The behaviour TCP shows after the detection of cogestion is called slowstart. 89) What is mean by SCPS-TP? The set of protocols developed for space communication is known as space communications protocol standards(scps), the extended TCP is called SCPS-transport protocols.(scps-tp). 90) What are Advantage and Disadvantage of MobileTCP? Advantage: i. M-TCP maintains the TCP end-to-end semantice. The SH does not send any ACK itself but forwards the ACKs from the MH. ii.if the MH is disconnected, M_TCP avoids useless retransmissions, slow starts or breaking connections by simply shrinking the sender s window to 0; iii. Since M-TCP does not buffer data in the SH as I-TCP does, it is not necessary to forward buffers to a new SH. Lost packets will be automatically retransmitted to the new SH. Disvantage: i. As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit errors is propagated to the sender. M-TCP assumes low bit error rates, which is not always a valid assumption. ii. A modified TCP on the wireless link not only requires modification to the MH protocol software but also new network elements like the bandwidth manager. 91) What is Fast retransmit? In TCP, a receiver sends acknowledgements only if it receive any packets from the

11 sender. Thus receiving acknowledgements from a receiver shows additionally that the receiver continuously receives something from the sender. Therefore, the gap in the packet stream is not due to severe congestion, but a simple packet loss due to a transmission error. The sender can now retransmit the missing packets before the timer expires. This behaviour is called fast retransmit. 92) What is fast retransmit? The gap in the packet stream is not due to severe congestion, but a simple packet loss due to a transmission error. The sender can now retransmit the missing packet before the timer expires. This behavior is called fast retransmit. 93) What is fast recovery? The receipt of acknowledgement shows that there is no congestion justifying a slow start. The sender can continue with the current congestion window. The sender performs a fast recovery from the packet loss. This mechanism can improve the efficiency of TCP dramatically. 94)What is HTTP? The Hypertext transfer protocol is a stateless, lightweight, application level protocol for data transfer between servers and clients. An HTTP transaction consists of an HTTP request issued by a client and an HTTP response from the server. Stateless means that all HTTP transactions independent of each other. 95)What is image scaling? If a page contains a true color, high-resolution picture, this picture can be scaled down to fewer colors, lower resolution, or finally to only the title of the picture. The user can decide to download the picture separately. Further one can offer clipping, zooming, or detail studies to users if they are interested in a part of the picture. 96) What is WAP? Wireless application protocol(wap) is a common effort of many companies and organizations to set up a framework for wireless and mobile web access using many different transport systems. Eg. GSM, GPRS, UMTS. 97) What is WMLBrowser? WMLBrowser is a library that provides several functions typical for a browser, such as prev to go back one card or refresh to update the context of the user interface. 98) Define Damping Transient changes in topology that are short duration should not distablize the routing mechanism.advertisements containing changes in topology currently stored are therefore not disseminated further.a node waits with dissemination if these changes aremost likely not yet stable.waitingg time depends on the time between the first and the best announcement. 99) Define Dynamic source routing. In an adhoc networks where nodes exchanges packets from time to time. Dynamic Source routing divides the task of routing into two separate problem i)routing Recovery:A node only tries to discover a route to destination if it has to send something to this destination and there is currently no known route ii).route Maintenance:If a nodeis continuously sending packets via route,it has to make sure that the route is held urgent.as soon as a node detects pbm with the current route it has ti find an alternative node. 100) Define WAP WAP is Wireless Application Protocol.It is the basic Objetive of the WAP forum are to bring diverse Internet content and others data service to digital cellular phones and

12 other wireless,mobile terminals.moreever a protocol suite should enable global wirless communication across different wireless network technologies.all WAP forum solution must be:interoperable,scaleable,efficient,reliable. Part - B 1. Explain different TDMA schemes in detail. Fixed TDMA, Classical TDMA, Slotted TDMA, Carrier sense multiple access, Demand assigned multiple access, PRMA Packet reservation multiple access, Reservation multiple access, Reservation TDMA, Multiple access with collision avoidance, Polling, Inhibit sense multiple access. 2. Write notes on DECT and TETRA System architecture, Protocol Architecture 3. Write notes on UMTS and IMT 2000 UMTS basic architecture, UTRA FDD mode, UTRA TDD mode 4. Account on CDMA Scheme. Good code, Orthogonal, Autocorrelation, Spread aloha multiple access. 5. Explain broadcast systems in detail. Overview Cyclical repetition of data Digital audio broadcasting Multimedia object transfer protocol Digital video broadcasting. 6. Explain satellite systems in detail. History Applications Basics GEO LEO MEO Routing Localization Handover Examples. 7. Explain GSM systems in detail. Mobile services- System Architecture Radio interface Protocols Localization and calling Handover Security - New data services HSCSD GPRS. 8. Explain IEEE standard for WLANS in detail. System architecture Protocol architecture Physical layer Frequency hopping spread spectrum, Direct spectrum spread spectrum, Infrared Medium access control layer- Basic DFWMAC-DCF using CSMA/CA, DFWMAC-DCF with RTS/CTS extension, DFWMAC-PCF with polling, MC frames MAC management Synchronization, Power management, Roaming b. 9. Write notes on WATM services and Functions. Wireless mobile terminal side functions and mobility supporting network side functions. 10. Write notes on WATM handover. Handover reference model, handover requirements, types of handover, hand over scenarios, backward handover, and forward handover. 11. Write notes on location management, addressing and access point control protocol. Requirements for location management, procedures and entities 12. Explain mobile IP in detail. Goals, assumptions and requirements Entities and terminology IP packet delivery Agent discovery Agent advertisement, Agent solicitation Registration Tunneling and encapsulation- IP-in-IP encapsulation, minimal encapsulation, generic routing encapsulation optimizations Reverse tunneling IPv Give a detailed account of mobile ad-hoc networks. Instant infrastructure, Disaster relief Remote areas Effectiveness Routing

13 Asymmetric links, redundant links, interference, dynamic topology - Destination sequence distance vector sequence numbers, damping - Dynamic source routing route discovery, route maintenance - Alternative metrics least interference routing. 14. Give a detail note on HYPERLAN. Reference model and configurations- Physical layer Data link control layer broadcast phase, downlink phase, uplink phase, random access phasebroascast channel, frame channel, access feedback channel, long transport channel, short transport channel, random channel Convergence layer Ethernet, IEEE 1394 (Firewire), ATM. 15. Account on BLUETOOTH in detail. User scenarios- Connection of peripheral devices, support of ad-hoc networking, bridging of networks Architecture networking, protocol stackradio layer Baseband layer- physical links- synchronous connection-oriented link, Asynchronous connectionless link link manager protocol L2CAP Security SDP Profiles IEEE Write notes on traditional TCP. Congestion control, slow start, fast retransmit/ fast recovery, implications on mobility. 17. Write notes on wireless TCP. Indirect TCP, snooping TCP, Mobile TCP, Fast retransmit/fast recovery, transmission/time-out freezing, selective retransmission, transaction oriented TCP. 18. Write notes on WDP and WTLS. Figure and explanation about WDP and WTLS. 19. Write notes on wireless transaction protocol.. Figure and explanation about WTP class 0, class 1 and class Write notes on wireless sessions protocol. WSP/B over WTP and WSP/ B as connectionless session service 21.Explain the various applications of mobile computing: Various applications and explanation 22.Write notes on UMTS and IMT 2000 Architecture-Frame formats and explanation 23.Explain the various satellite orbit and the parameters associated Parameters of satellites and explanations-three orbits and explanation 24.Explain mobile IP in detail Architecture-various techniques-explanation 25.Explain Traditional TCP Architecture-Types- Frame formats-explanation

COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS

COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SUBJECT CODE& NAME: IT1403 MOBILE COMPUTING YEAR / SEM : IV / VIII UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)

More information

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT I PART A (2MARKS)

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT I PART A (2MARKS) DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code : IT1402 Subject Name : Mobile Computing Year / Sem : IV / VII UNIT I PART A (2MARKS) 1.What are the 3 fundamental propagation behaviors

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -00 0 WIRELESS NETWORKS AND MOBILE COMPUTING TUTORIAL QUESTION BANK Course Name WIRELESS NETWORKS AND MOBILE COMPUTING Course Code

More information

CS2402-MOBILE AND PERVASIVE COMPUTING

CS2402-MOBILE AND PERVASIVE COMPUTING CS2402-MOBILE AND PERVASIVE COMPUTING UNIT 1 TWO MARK QUESTIONS IN UNIT-1 1. Define SAMA. 2. Define CDMA. 3..What are the several versions in CSMA? 4.What is meant by non-persistent CSMA? 5.What is meant

More information

CS Mobile and Pervasive Computing

CS Mobile and Pervasive Computing CS2402 - Mobile and Pervasive Computing UNIT 1 TWO MARK QUESTIONS IN UNIT-1 1. Define SAMA. 2. Define CDMA. 3..What are the several versions in CSMA? 4.What is meant by non-persistent CSMA? 5.What is meant

More information

ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur

ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur - 621220 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : IV/ VII Subject Code : CS2402 Subject Name : MOBILE AND PERVASIVE

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (AUTONOMOUS) Dundigal, Hyderabad -00 0 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name MOBILE COMPUTING Course Code A70 Class IV B. Tech I Semester

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

wireless networks and mobile computing (COMMON TO CSE AND CS) CONTENTS Classification of Wireless Networks

wireless networks and mobile computing (COMMON TO CSE AND CS) CONTENTS Classification of Wireless Networks i wireless networks and mobile computing FOR m.tech (jntu - hyderabad) i year Ii semester (COMMON TO CSE AND CS) CONTENTS UNIT - I [CH. H. - 1] ] [WIRELESS NETWORKS]... 1.1-1.24 1.1 WIRELESS NETWORK...

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Internet Services & Protocols. Mobile and Wireless Networks

Internet Services & Protocols. Mobile and Wireless Networks Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Mobile and Wireless Networks Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Wireless Transmission and Mobility

Wireless Transmission and Mobility Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Supporting mobility only on lower layers up to the network layer is not

Supporting mobility only on lower layers up to the network layer is not Mobile transport layer Supporting mobility only on lower layers up to the network layer is not enough to provide mobility support for applications. Most applications rely on a transport layer, such as

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

CS4516 Advanced Computer Networks. Final Review

CS4516 Advanced Computer Networks. Final Review Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Communication Systems for the Mobile Information Society

Communication Systems for the Mobile Information Society Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

Faculty of Computer Science and Technology, UTU 2015

Faculty of Computer Science and Technology, UTU 2015 Unit-1 Wireless Transmission Short Questions: 1. Give definition of signal. 2. What is the Transmission range for signal propagation? 3. What is the Detection range for signal propagation? 4. What is the

More information

III/IV B.Tech (Regular/Supplementary) DEGREE EXAMINATION Wireless Networks (14IT602) Scheme of Evaluation

III/IV B.Tech (Regular/Supplementary) DEGREE EXAMINATION Wireless Networks (14IT602) Scheme of Evaluation III/IV B.Tech (Regular/Supplementary) DEGREE EXAMINATION Wireless Networks (14IT602) Scheme of Evaluation Time: Three Hours Answer Question No.1 compulsorily. (1X12 = 12 Marks) Answer ONE question from

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

GPRS System Architecture

GPRS System Architecture 1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number

More information

CSCI-1680 Wireless Chen Avin

CSCI-1680 Wireless Chen Avin CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Advanced Computer Networks. WLAN, Cellular Networks

Advanced Computer Networks. WLAN, Cellular Networks Advanced Computer Networks 263 3501 00 WLAN, Cellular Networks Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last week Medium Access COPE Today Last week Short

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer E.g. HTTP (used by web services) typically uses TCP Reliable transport between client and server required TCP Stream oriented Network friendly: time-out congestion

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department ACOE 422 Wireless Computer Networks WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department Resources: Mobile Communications, J. Schiller book slides

More information

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Student ID: CS457: Computer Networking Date: 5/8/2007 Name: CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology) Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information